this post was submitted on 17 Apr 2025
64 points (95.7% liked)

Selfhosted

46168 readers
468 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

cross-posted from: https://reddthat.com/post/39309359

I've been running Home Assistant for three years. It's port forwarded on default port 8123 via a reverse proxy in a dedicated VM serving it over HTTPS and is accessible over ipv4 and ipv6. All user accounts have MFA enabled.

I see a notification every time there's a failed login attempt, but every single one is either me or someone in my house. I've never seen a notification for any other attempts from the internet. Not a single one.

Is this normal? Or am I missing something? I expected it to be hammered with random failed logins.

you are viewing a single comment's thread
view the rest of the comments
[–] meltedcheese@c.im 0 points 4 days ago (1 children)

@Showroom7561 You are referring to incoming IPs? I get around 50 to 100 per day as well. Easily blocked. My bigger concern is outgoing connections by home automation devices on my network. I have over 200 lights, switches, and sensors of various brands, most of which try to “phone home” anywhere from daily to every few seconds. They are reporting (something) to data aggregation businesses that presumably are selling. Blocking some devices from Internet access (e.g., my Leviton light switches) causes the device to fail! Yet another case of companies stealing our personal data.

[–] Showroom7561@lemmy.ca 3 points 4 days ago

Yes, incoming.

Outgoing is another can of worms.

I try to run any of my iot devices on an isolated network. At most, they can see eachother, and that's it.

Some devices need an internet connection, unfortunately.

The best you can do, if you're unable to block their collection outright, is to run them through a tracker-blocking DNS (either self-hosted or something like Adguard DNS).

That can minimize unnecessary pings home.

Personally, if I think that a device is being malicious in their attempts to phone home, I stop using the device. I also try to make an effort to not get a smart device, if the alternative (unconnected option) works fine.

Digital minimalism is one way to protect ourselves from rampant data collection and profiling.